Privacy Measures for Secure Multiparty Computing Applications
Xiong Wei1, Wang Haiyang2, Tang Yifei3, and Liu Wei1#br#
#br#
1(Rongan China Digital Technology(Beijing) Co., Ltd., Beijing 100086)
2(Beijing International Data Exchange Co., Ltd., Beijing 100020)
3(National Engineering Research Center for Big Data Collaborative Security Technology, Beijing 100071)
[1]Yao A C. Protocols for secure computations[C] Proc of the 23rd Annual IEEE Symp on Foundations of Computer Science. Piscataway, NJ: IEEE, 1982: 160164[2]Shannon C E. A mathematical theory of communication[J]. Bell System Technical Journal, 1948, 27(3): 379423[3]王彩梅, 郭亚军, 郭艳华. 位置服务中用户轨迹的隐私度量[J]. 软件学报, 2012, 23(2): 352360[4]Reiter M K, Rubin A D. Crowds: Anonymity for Web transactions[J]. ACM Trans on Information and System Security, 1998, 1(1): 6692[5]Wright M, Adler M, Levine B, et al. An analysis of the degradation of anonymous protocols[C] Proc of the Network and Distributed System Security Symp. San Diego: The Internet Society, 2002: 112[6]Shmatikov V. Probabilistic analysis of anonymity[C] Proc of the IEEE Computer Security Foundations Workshop. Piscataway, NJ: IEEE, 2002: 119128[7]Schneider S, Sidiropoulos A. CSP and anonymity[C] Proc of European Symp on Research in Computer Security. Berlin: Springer, 1996: 198218[8]Shmatikov V. Probabilistic analysis of an anonymity system[J]. Journal of Computer Security, 2004, 12(34): 355377[9]Syverson P F, Gray J W. The epistemic representation of information flow security inprobabilistic systems[C] Proc of the 8th Computer Security Foundations Workshop. Piscataway, NJ: IEEE, 1995: 152166[10]彭长根, 丁红发, 朱义杰, 等. 隐私保护的信息熵模型及其度量方法[J]. 软件学报, 2016, 27(8): 18911903[11]中国信息通信研究院安全研究所. 隐私保护计算技术研究报告(2020)[EBOL]. 北京: 中国信息通信研究院, 2020 [20230511]. http:www.caict.ac.cnkxyjqwfbztbg202011t20201110_361696.htm[12]马英. 一种基于隐私计算的数据共享模型研究[J]. 信息安全研究, 2022, 8(2): 122128[13]Shamir A. How to share a secret[J]. Communications of the ACM, 1979, 22(11): 612613[14]Gentry C. Fully homomorphic encryption using ideal lattices[C] Proc of Annual ACM Symp on Theory of Computing. New York: ACM, 2009: 169178[15]Lindell Y. Secure multiparty computation (MPC)[EBOL]. 2020 [20230511]. https:eprint.iacr.org2020300